It would appear that nobody's consciously thought about how extended auth header info is supposed to get into package sack objects from repo configs.

I now have this huge problem (in 2.5.1 even) where I specify a repo:

[local]
name=local
baseurl=http://username:[EMAIL PROTECTED]:9080/plone/RPMBuilder/RPMS


And the auth header info is unceremonously abandoned by the time it comes to do the repoSack::getPackage. Without the url being constructed as such, urlgrabber doesn't actually have the auth headers to respond to the 401.

It's not obvious to me as to how this should be fixed - auth headers probably aren't something you want in the package sack. But equally, it seems absurd to write a predownload callback to splice these into the basepath's.

The http_headers dict also doesn't have a very exposed API (and only seem to be used for a cache pragma anyway), and while you could shove them (manually encoded) in there, it's not exactly transparent delegation to urlgrabber.

Whats to be done?

Alan
_______________________________________________
Yum-devel mailing list
[email protected]
https://lists.dulug.duke.edu/mailman/listinfo/yum-devel

Reply via email to